The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
University
| Teaching Since: | Apr 2017 |
| Last Sign in: | 438 Weeks Ago, 1 Day Ago |
| Questions Answered: | 9562 |
| Tutorials Posted: | 9559 |
bachelor in business administration
Polytechnic State University Sanluis
Jan-2006 - Nov-2010
CPA
Polytechnic State University
Jan-2012 - Nov-2016
Professor
Harvard Square Academy (HS2)
Mar-2012 - Present
Suppose Alice wants to visit the Web site activist.com using a TOR-like service. This service uses two non-colluding proxy servers, Proxy1 and Proxy2. Alice first obtains the certificates (each containing a public key) for Proxy1 and Proxy2 from some central server. Denote K1+( ), K2+( ), K1 –( ), and K2 –( ), for the encryption/decryption with public and private RSA keys
a. Using a timing diagram, provide a protocol (as simple as possible) that enables Alice to establish a shared session key S1Â with Proxy1. Denote S1(m) for encryption/decryption of data m with the shared key S1
b. Using a timing diagram, provide a protocol (as simple as possible) that allows Alice to establish a shared session key S2Â with Proxy2 without revealing her IP address to Proxy2.
c. Assume now that shared keys S1Â and S2Â are now established. Using a timing diagram, provide a protocol (as simple as possible and not using public-key cryptography) that allows Alice to request an html page from activist.com without revealing her IP address to Proxy2 and without revealing to Proxy1 which site she is visiting. Your diagram should end with an HTTP request arriving at activist.com.
Â
Â
-----------